Faster Breach Detection

Logo
Presented by

Ron Stein, CPacket Networks

About this talk

Breaches happen by clever and well-armed cybercriminals who use many tactics, techniques, and procedures to infiltrate IT infrastructure, implant malware, and execute attacks. There is a lot at stake, so you need to know as much as possible with little or no delay to minimize adverse consequences. Network monitoring that pipelines packets from the core network to cybersecurity analysts and analytics is the foundation of detecting and responding. Stealth is an often-used weapon, so monitoring with the highest possible fidelity is necessary to detect increasingly subtle Indicators of Attack and Indicators of Compromise. This webinar will provide a stepwise plan for achieving faster breach detection and maximizing resilience to cyber risks by showing you how to: • Instrument any network, physical, virtual, hybrid-cloud, for high-fidelity monitoring to losslessly acquire and reliably deliver network packet data to SOC and SecOps security analysts and the analytics and tools they use • Capture, store, and organize network packet data for use as security evidence • Forensically analyze security evidence to facilitate a rapid and effective response
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198830)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.